Webinar

Splunk + EnCase:
3 Ways to Improve Operational Intelligence with Forensic Security

Presenters:
Mitchell Bezzina, Principal Solutions Consultant, Guidance Software
Megan Stewart, Professional Services Consultant, Guidance Software

Watch Webinar
Enfuse 2018 | May 21- 24
Learn More

Types

Topics

Products

Languages

Publication

EDR Buyer's Guide: Addressing Multi-stage Attacks ...

This Buyer's Guide, written by The Enterprise Strategy Group, examines the must-have components of EDR tools for security teams that are looking to enhance their detection and response capabilities.
pdf
Quick Reference Guide

TX1 Quick Reference Guide

This document provides step-by-step instructions for setting up and connecting the Tableau TX1 Forensic Imager along with other information for basic operation of the device.
pdf
Publication

2017 Gartner EDR Competitive Landscape Report

The Gartner Competitive Landscape: Endpoint Detection and Response Tools report evaluates the top-10 providers most often on Gartner client shortlists and those with the greatest estimated market penetration according to Gartner client inquiry and ma...
pdf
Product Brief

Integrated Open-Source Toolkit for Incident Respon...

EnCase Endpoint Security's integrated open-source toolkit strengthens and centralizes the incident response process with a robust set of integrations to various open source applications, combining the leading forensics and endpoint response platform ...
pdf
Product Brief

EnCase Endpoint Security Complement Guide

Guidance Software, the global leader in forensic security, understands the problem of maintaining continuity between security tools. We believe the best security requires tools that “talk” to each other and work together to keep the network safe. Wit...
pdf
Informe de Producto

EnCase Endpoint Security Complement Guide - Españo...

EnCase Endpoint Security Complement Guide - Español
pdf
Product Brief

360° Endpoint Threat Assessment Service

Guidance Software's 360° Threat Assessment Service from Guidance locates active adversaries that may be present on your network and identifies signs of past breaches so security teams can take action.
pdf